The use of mobile computers is gaining popularity. The number of users with laptops and notebooks is increasing and this trend is likely to continue in the future where the number...
As mobile devices, such as laptops, PDAs or mobile phones, are getting more and more ubiquitous and are able to communicate with each other via wireless technologies, the paradigm...
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
While dedicated technologies such as e.g., Sun’s J2ME MIDP offer a simple programming model for mobile applications, appropriate support for modularizing the implementation of t...
Traditionally network monitoring and management has been done using predominantly centralized techniques. Mobile agents have been proposed as an alternative to this centralized app...
Farhad Kamangar, David Levine, Gergely V. Zá...